First published: Tue Mar 22 2011(Updated: )
An integer overflow, leading to heap-based buffer overflow, was found in The Gimp's Personal Computer eXchange (PCX) image file plug-in. A remote attacker could provide a specially-crafted PCX image file, which once opened by a local, unsuspecting user would lead to denial of service (GIMP PCX plug-in crash) or, potentially, arbitrary code execution with the privileges of the user running Gimp.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GIMP | <=2.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1178 is rated as a high severity vulnerability due to the potential for remote code execution and denial of service.
To mitigate CVE-2011-1178, users should upgrade to a version of GIMP newer than 2.7.0, where the vulnerability has been patched.
CVE-2011-1178 is classified as an integer overflow leading to a heap-based buffer overflow.
CVE-2011-1178 affects users of GIMP versions up to and including 2.7.0 that handle PCX image files.
Exploiting CVE-2011-1178 may result in denial of service attacks or arbitrary code execution on affected systems.